TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: All
from: Geo.
date: 2002-12-21 22:16:12
subject: another root exploit in BIND

From: "Geo." 

To: bugtraq{at}securityfocus.com announce{at}lists.caldera.com
security-alerts{at}linuxsecurity.com full-disclosure{at}lists.netsys.com

____________________________________________________________________________
__

   SCO Security Advisory

Subject:  Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)
Advisory number:  CSSA-2002-059.0
Issue date:   2002 December 19
Cross reference:
____________________________________________________________________________
__


1. Problem Description

 From CERT CA-2002-31:

 Multiple vulnerabilities have been found in BIND (Berkeley
 Internet Name Domain).

 One of these vulnerabilities may allow remote attackers to
 execute arbitrary code with the privileges of the user running
 named, typically root.

 Other vulnerabilities may allow remote attackers to disrupt
 the normal operation of your name server, possibly causing a
 crash.

 A vulnerability in the DNS resolver library may allow remote
 attackers to execute arbitrary code with the privileges of
 applications that issue network name or address requests.


2. Vulnerable Supported Versions

 System    Package
 ----------------------------------------------------------------------

 OpenLinux 3.1.1 Server  prior to bind-8.3.4-1.i386.rpm
     prior to bind-doc-8.3.4-1.i386.rpm
     prior to bind-utils-8.3.4-1.i386.rpm

 OpenLinux 3.1.1 Workstation prior to bind-8.3.4-1.i386.rpm
     prior to bind-doc-8.3.4-1.i386.rpm
     prior to bind-utils-8.3.4-1.i386.rpm

 OpenLinux 3.1 Server  prior to bind-8.3.4-1.i386.rpm
     prior to bind-doc-8.3.4-1.i386.rpm
     prior to bind-utils-8.3.4-1.i386.rpm

 OpenLinux 3.1 Workstation prior to bind-8.3.4-1.i386.rpm
     prior to bind-doc-8.3.4-1.i386.rpm
     prior to bind-utils-8.3.4-1.i386.rpm


3. Solution

 The proper solution is to install the latest packages. Many
 customers find it easier to use the Caldera System Updater, called
 cupdate (or kcupdate under the KDE environment), to update these
 packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

 4.1 Package Location

 ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/RPMS

 4.2 Packages

 dbade93f9de80c9d05dafdb010c51f0f bind-8.3.4-1.i386.rpm
 077c5888f3c3f3074bcb12c79c9c97ec bind-doc-8.3.4-1.i386.rpm
 dfad9dd9bea8a88ba1958e68b6b255a7 bind-utils-8.3.4-1.i386.rpm

 4.3 Installation

 rpm -Fvh bind-8.3.4-1.i386.rpm
 rpm -Fvh bind-doc-8.3.4-1.i386.rpm
 rpm -Fvh bind-utils-8.3.4-1.i386.rpm

 4.4 Source Package Location

 ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/SRPMS

 4.5 Source Packages

 73b4995cc2c66829aca6e2e181b1de2f bind-8.3.4-1.src.rpm


5. OpenLinux 3.1.1 Workstation

 5.1 Package Location


ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/RP
MS

 5.2 Packages

 0816f38b7ffacae029944eefae8a6fef bind-8.3.4-1.i386.rpm
 0b514bae1d74d281969b55b9e84e9056 bind-doc-8.3.4-1.i386.rpm
 328c16be821f03f048701072bea4c290 bind-utils-8.3.4-1.i386.rpm

 5.3 Installation

 rpm -Fvh bind-8.3.4-1.i386.rpm
 rpm -Fvh bind-doc-8.3.4-1.i386.rpm
 rpm -Fvh bind-utils-8.3.4-1.i386.rpm

 5.4 Source Package Location


ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/SR
PMS

 5.5 Source Packages

 763945e1c5e05dfa2146f2acb6725556 bind-8.3.4-1.src.rpm


6. OpenLinux 3.1 Server

 6.1 Package Location

 ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/RPMS

 6.2 Packages

 89d9ba24ca8adcc2e6e791abea0f5df4 bind-8.3.4-1.i386.rpm
 ba283adcfc05258e3721d0ca579f47b1 bind-doc-8.3.4-1.i386.rpm
 82b68b5152da23bcc376ae2514a75f14 bind-utils-8.3.4-1.i386.rpm

 6.3 Installation

 rpm -Fvh bind-8.3.4-1.i386.rpm
 rpm -Fvh bind-doc-8.3.4-1.i386.rpm
 rpm -Fvh bind-utils-8.3.4-1.i386.rpm

 6.4 Source Package Location

 ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/SRPMS

 6.5 Source Packages

 ddd2198ec937e0ba50313c595f08817b bind-8.3.4-1.src.rpm


7. OpenLinux 3.1 Workstation

 7.1 Package Location


ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/RPMS

 7.2 Packages

 7c263440991263144153d218d458e7ff bind-8.3.4-1.i386.rpm
 1d5a28636c90eea847fbad88d966ac6c bind-doc-8.3.4-1.i386.rpm
 1543644de1b99e07aaa32b50342d8105 bind-utils-8.3.4-1.i386.rpm

 7.3 Installation

 rpm -Fvh bind-8.3.4-1.i386.rpm
 rpm -Fvh bind-doc-8.3.4-1.i386.rpm
 rpm -Fvh bind-utils-8.3.4-1.i386.rpm

 7.4 Source Package Location


ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/SRPM
S

 7.5 Source Packages

 09918127df81de1874ec96628bf45695 bind-8.3.4-1.src.rpm


8. References

 Specific references for this advisory:

  http://www.cert.org/advisories/CA-2002-31.html
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1219
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1220
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1221

 SCO security resources:

  http://www.sco.com/support/security/index.html

 This security fix closes SCO incidents sr871561, fz526618,
 erg712159.


9. Disclaimer

 SCO is not responsible for the misuse of any of the information
 we provide on this website and/or through our security
 advisories. Our advisories are a service to our customers intended
 to promote secure installation and use of SCO products.

____________________________________________________________________________
__

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.